Taken from the GAF thread, it looks like SCE's internal toolset for disc imaging which probably means it signs code. This DemonHades guy is probably going to end up in prison if he lives in the US or EU.
I would think (hope?) disc imaging and signing are separate. There's reasons to need actual discs to test load times and such on debug units for devs (Insomniac mentioned that stage of development iirc), so more people would have disc imaging than they would key signing, which only needs to be done before pressing. Plus it says it's a demo build.
Dunno if that helps any.
Interesting observation is that's copyrighted 2007, so it's an old piece of code that Sony will already be aware of, I'm sure.
Taken from the GAF thread, it looks like SCE's internal toolset for disc imaging which probably means it signs code.
Yes, this is the dev tool for creating test discs and .PKGs packages that can be redistributed onto PS3s. And they only work with debug PS3s because the code is unsigned. It cannot create a full-fledged PS3 game disc. That is presumably handled in Sony's top-level manufacturing, and access to that will be extremely limited, unlike an SDK that's sent to every developer.OK well that makes sense. In which case there isn't much of anything new there...
This makes me wonder about Sony's internal security. SDK 1.6 is out. Are any later ones out, or did Sony plug that leak? They must be aware of such leaks (they should have a mole in the hacker scene) and they must be aware of what problems come with that, so must at least want to address that somehow even if they haven't found a way to control leaks. Designing a security system, certainly for next gen given the lesson of this one, is going to have to factor in that NDAs and the threat of litigation aren't enough to protect a platform from internal breaches.Upon investigation that Disk image generator is nothing new. SDK 1.6 was leaked a long time ago...
Indeed. I was able to find a story of the leaked 1.6 SDK dated June 7, 2007.Interesting observation is that's copyrighted 2007, so it's an old piece of code that Sony will already be aware of, I'm sure.
This makes me wonder about Sony's internal security. SDK 1.6 is out. Are any later ones out, or did Sony plug that leak? They must be aware of such leaks (they should have a mole in the hacker scene) and they must be aware of what problems come with that, so must at least want to address that somehow even if they haven't found a way to control leaks. Designing a security system, certainly for next gen given the lesson of this one, is going to have to factor in that NDAs and the threat of litigation aren't enough to protect a platform from internal breaches.
Looking back, I'm almost certain it's the bolded scenario. He was glitching points all over his PS3; remember how his MAC address was all FF? He said it was the result of an earlier hack attempt. That he never had to replace his system suggests that he knew what he was glitching.As for the current state of PS3 hackedness, this latest episode has diverted us from the real meat. The USB Jig and its associaited application is new and we don't know how it works, and the service manuals have opened up a hardware vector. This latter one could maybe allow custom firmware chips to be added to prevent lockouts by Sony. Then again, for all we know GeoHotz had access to these docs when he made his hack which had to do with timings. That seems highly probable now, and would mean the scene hasn't changed, only we've become aware of what tools the scene has to work with.
I`d go as far as saying that every console since the PS1 was hacked using internal docs (first time access to the system). Just doesnt seem possible otherwise, of course unless the docs get leaked you can never prove it.As for the current state of PS3 hackedness, this latest episode has diverted us from the real meat. The USB Jig and its associaited application is new and we don't know how it works, and the service manuals have opened up a hardware vector. This latter one could maybe allow custom firmware chips to be added to prevent lockouts by Sony. Then again, for all we know GeoHotz had access to these docs when he made his hack which had to do with timings. That seems highly probable now, and would mean the scene hasn't changed, only we've become aware of what tools the scene has to work with.
That was fast
ORDERS that up to and including *31 August 2010, the First to Fourth Respondents and each of them, whether by themselves, their servants or agents, be restrained from doing any of the following acts with respect to all and any Universal Serial Bus devices described as "PSJailbreak" in Exhibit PJC-1 of the affidavit of Peter John Chalk sworn on 26 August 2010 and filed herein, as packaged and distributed or threatened to be distributed by those Respondents (PSJailbreak Devices):
https://www.comcourts.gov.au/file/Federal/P/VID727/2010/actions